Home security video system using internet technique

Inactive Publication Date: 2006-04-25
AVAGO TECH WIRELESS IP SINGAPORE PTE
22 Cites 223 Cited by

AI-Extracted Technical Summary

Problems solved by technology

However, the greatest problem in this system is that we can not have sufficient confidence about an intruder solely from the sensor signals.
Therefore, these measures are in vain in such instances.
This system also entails problems to be improved.
The first problem is that, although reporting information is transmitted promptly by means of this system, it also contains undesired or redundant information that are added to the requested information.
As a result, excessive time is required for the user to have a confidence as to the presence of an intruder.
For this reason, users who need information rapidly find above one is inconvenient...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

[0042]In the case described above, in order to issue a command to camera devices 21, 22 and 23 for acquisition of existing images, a mode (not shown in the figure) may be used in which server means 10 sends a message to communication device 20 directly by using public telephone line. In this case, communications device 20 contains a system that can confirm that there is a telephone signal or calling signal from server means 10. When it has been confirmed that there is a signal from server means 10, communications device 20 issues a command in the same way a...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Benefits of technology

[0019]Namely, according to the security system of this invention, several camera devices and communication devices are installed in sites at which monitoring is necessary for the user. When the security mode is turned on, the several camera devices operate so that specified positions of the site are monitored. Each camera device itself has a function of motion detection. The unusual status reporting signals and the necessary imaging information are provided to the communication means only when the camera device detects the motion of an intruder. Because the images taken by the camera devices are the major criteria for judgment, the number of error reports can be decreased. The communication means is connected to the server that acts as an information center using the internet line only when an unusual status reporting signal has been received from a camera device and the information from the camera device is also provided to the server means at this time. The image is transmitted at the sa...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

A security system including several camera devices and a communication device in sites at which monitoring is required by a user. The several camera devices may constantly monitor the sites. The camera devices have motion detecting functions and provide unusual status reporting signals and necessary image information to the communications device when the movements of an intruder have been detected. The communication device communicates with and is connected to a server that serves as an information center via the internet line when unusual status signals have been received. The information from the camera devices is also sent to server. The server automatically notifies the user by a predetermined user-selected method. The notified user can access the server and confirm the information.

Application Domain

Technology Topic

Image

  • Home security video system using internet technique
  • Home security video system using internet technique
  • Home security video system using internet technique

Examples

  • Experimental program(1)

Example

[0026]We shall now present a detailed description of the structure of the security system that is a desirable mode of execution of this invention by reference to the appended figures.
[0027] 10 server means 11 web server 12 data base server 20 communications device 21, 22, 23 camera devices 100 security system
[0028]FIG. 1 is a schematic diagram of the security system 100 that is a desirable embodiment this invention. It can be understood that this security system 100, which makes use of the internet line 80, is constructed with server means 10 as its center. Server means 10 contains the web server 11 and the database server 12. On the other hand, several camera devices 21, 22 and 23 and at least one communications device 20 are installed in the place 200 that is to be monitored in the buildings for each family. When security system 100 is used for home security, camera devices 21, 22 and 23 are installed in the necessary sites inside and outside the house. Although there are three camera devices in the figure, there is no limitation on the number of devices, and the number can be increased or decreased, as required. As shown in FIG. 1, the sensor 29 is also installed. In the specification no particularly detailed description about the sensor 29, but the sensor 29 can send some information to server means 10, (the database server 12) and is also used for judging the situation.
[0029]As described, camera devices 21, 22 and 23 can communicate with communications device 20. The communication between camera devices 21, 22 and 23 and communications device 20 can be lines that are installed in ordinary houses such as power source lines and wireless communication means such as Bluetooth™. On the other hand, communications device 20 can be connected to web server 11 of server means 10 through public telephone line 71 by dial-up connections, and the internet service provider 81. Further, server means 10 can be connected to user terminal 28, which can form a mirror image architecture, through internet line 80, the internet service provider 82 and the public telephone line 72. Establishment of communication and its action will be described subsequently.
[0030]FIG. 2 shows the four types of setting modes of the system. Switching of these setting modes can be performed by communications device 20. “Off mode” signifies a state in which a person or owner exists in [is at] the site, and there is no need of monitoring and camera devices 21, 22 and 23 are not being performed. “Security on mode” is the mode that is set when the owner is not present and monitoring by camera devices 21, 22 and 23 is requested. For example, when the owner is going out and this mode has been selected, operation of this mode begins and monitoring by camera devices 21, 22 and 23 can start after preselected time for the controller to go out. The other two modes, the “time designation mode” and the “message sending mode” are not always necessary and they are for providing supplemental actions. This will be discussed subsequently. Prior to that, we shall present a detailed description of the action of the “security on mode.” Other modes also can be set in security system 100.
[0031]FIG. 3 shows the detailed structure of camera devices 21, 22 and 23 and of communications device 20 that are installed at the site 200 to be monitored. Because camera devices 21, 22 and 23 have the same structure, we shall describe only camera device 21 as a representative example. Camera device 21 has the camera image-receiving component 41, the data-processing component 42, the memory component 43, the transmitting-receiving component 44 and the control component 45. The communications device 20 has the first transmitting-receiving component 91, data processing component 92, the memory component 93 and the second transmitting-receiving component 94. Camera devices 21, 22 and 23 also have the voice detection unit 49, which includes a microphone so that voice information can be incorporated in addition to image information and it can be combined with image data to serve as monitoring data. Consequently, although we shall describe only image data for convenience in the subsequent explanation, the term image data can also include voice data.
[0032]When the system is set to the “security on mode,” cameras 21, 22 and 23 receive the signal of operation starting from communications device 20. At this time, camera devices 21, 22 and 23 either operate independently from the communication device 20 with the communication being off state or have communication of preparation signal exchange with communication device 20 under decreased power consumption.
[0033]We shall describe this operation of camera device 21 as a representative example. The camera image-receiving component 41 inside camera device 21 sends the received image to data-processing component 42 as image data. Data-processing unit 42 has a function of motion detection for detecting objects performing specified movements. Specifically, when an image of a moving intruder is imaged in camera image-receiving component 41, the presence of the intruder can be detected from the information relating to movement in the image data in data-processing component 42 which has received the corresponding image data.
[0034]When the presence of an intruder has been detected by data-processing component 42, camera device 21 for the first time establishes a communication connection with communications device 20 and an unusual status reporting signal is sent from transmitting-receiving component 44 to first transmitting-receiving component 91 of communications device 20. The image data before and after detecting the presence of the intruder, as required, are stored in memory component 43 as a still image. All or some of these data are sent to communications device 20 with the unusual status reporting signal or after the signal has been transmitted.
[0035]In first transmitting-receiving component 91, communications device 20, which has received an unusual status reporting signal from at least one of camera devices 21, 22 and 23, operates so as to establish a connection to the internet service provider (ISP) 81 that is to be connected to server means 10 by the second transmitting-receiving component 94. In addition, adjustment of the image data that have been received is performed in data-processing component 92. The image data are adjusted as time-passage still images by each of camera devices 21, 22 and 23 which have received unusual status reporting signals. When the communication connection has been established, communications device 20 sends the unusual status reporting signal and the adjusted image data to server means 10. The unusual status reporting signal and the image data can be combined or they can be sent separately. In both cases, they are transmitted as data forms which include information of relation with camera devices 21, 22 and 23. The image data that have been sent to server means 10 are stored in database server 12. The image data that have been stored temporarily in camera devices 21, 22 and 23 and communications device 20 can be deleted after they have been transmitted appropriately to the next-stage device.
[0036]When an unusual status reporting signal is sent to server means 10 and if the user wishes, automatic notification is performed for the purpose of reporting the fact that there was an unusual status reporting status signal from server means 10. The means of notification can be an electronic mail using internet line 80 to deliver mail to user terminal 28, portable telephone through the telephone company 65 or a telephone 66 in a fixed position. (See FIG. 1.) The user can promptly know some trouble when he is not present. The notification address in this case is not limited to one place and may be several places.
[0037]The image data that have been sent to database server 12 can be seen from the outside by receiving validation when the user access the specific web site. Namely, the user who was informed of the unusual status can know the cause of the report by going onto internet line 80 and accessing web server 11. At the web site, images before and after the abnormality, for example, images of a moving intruder, can be checked so that the user can promptly confirm the presence of an intruder.
[0038]Although not shown in the figure, in such a case, a suitable contact address is prepared on the web site for supporting a prompt response by the user. For example, when the user has confirmed the presence of an intruder, it is possible to connect promptly to a security-guard company or the police 99 through the agency of the web site (i.e., web server 11) so that the intruder can be captured. At this time, by means of the web site (not shown) the user can make a notification by him to some persons by registering a connection address in advance on the web site, which are not the security-guard company or police 99.
[0039]A further characteristic of security system 100 according to the embodiment of the present invention is that the user can control communications device 20 and camera devices 21, 22 and 23 from user terminal 28. By means of the “security on mode”, a request can be made for confirmation of the state from the user side not only when a report has been made but also when a natural disaster such as an earthquake or flooding has occurred. In this embodiment it is realized using internet line 80 in which server means 10 is interposed.
[0040]The user, when necessary, enters the internet line 80 from his own user terminal 28 through the internet service provider 82 and accesses the web site, which is not shown in the figure, but provided by server means 10. On the web site, a menu is prepared for controlling the registered communications device 20 and camera devices 21, 22 and 23 that can communicate with the communication device 20 after user validation. The user selects an appropriate menu, and, by performing a suitable operation, for example, by remotely controlling the control component 45, can make changes in the monitoring angle range and set mode of camera devices 21, 22 and 23.
[0041]Further, the user can access the web site and command the acquisition of existing images from camera devices 21, 22 and 23. In this case, server means 10 establishes communication with communications device 20 on the basis of information that has been provided in advance through the agency of a suitable internet service provider 81 and commands acquisition of images to communications device 20. Communications device 20 forcibly commands camera devices 21, 22 and 23 to transmit the existing image data that have been received. Following that, when camera devices 21, 22 and 23 find an abnormality due to an intruder, the image data are stored in data server means 12 of server means 10 as a result of flow of the same data. In this case, server means 10 notifies user terminal 28 that image acquisition has been completed by means of an electronic mail system through internet line 80. The user can confirm the updated images by accessing the web site later.
[0042]In the case described above, in order to issue a command to camera devices 21, 22 and 23 for acquisition of existing images, a mode (not shown in the figure) may be used in which server means 10 sends a message to communication device 20 directly by using public telephone line. In this case, communications device 20 contains a system that can confirm that there is a telephone signal or calling signal from server means 10. When it has been confirmed that there is a signal from server means 10, communications device 20 issues a command in the same way as described above to camera devices 21, 22 and 23 to transmit image data. Next, communications device 20, which has received the image data, establishes a connection to server means 10 through internet service provider 81 and provides the image data to server means 10. The subsequent operations are the same as in the case described above. The telephoning time by telephone line to communications device 20 from server means 10 in the early stage becomes relatively short time. Therefore, the costs that are generated by telephoning are comparatively inexpensive.
[0043]Incidentally, due to the “security on mode,” there may be an inconvenience that camera devices 21, 22 and 23 are in operation when the owner returns home. In this case, there is the desirable feature that the user can change communications device 20 to the “off” mode by means of a wireless system from outside of the place 200 to be monitored. In the another alternative, when camera devices 21, 22 and 23 detect the movement of the user and recognize an unusual status, it is possible to change the mode to the “off” mode by operating communications device 20 within a specified time and to stop the transmission of the unusual status reporting signal to server means 10.
[0044]Next, we shall explain other two modes, the “time designation monitoring mode” and the “message sending mode” which are supplemental modes that can be added to the “off mode” and the “security on mode.” These two other modes are not necessarily needed for crime prevention.
[0045]By means of the “time designation monitoring mode,” a camera device is installed so that a specified object can be monitored and the object is monitored at a time designated by the user. This mode is used, for example, for observing pets, For example, camera device 21, as a result of receiving the command to acquire images from server means10 thought communications device 20 at a time designated in advance, acquires images at that time. These image data are sent in the same way as in the “security on mode” and are stored in data base server 12. Consequently, the user can confirm the image by accessing the web site. In this mode, it is also possible for the user to acquire images by sending a command from the web site when user request at a non-designated time.
[0046]By means of the “message sending mode,” as described above, for example, messages can be constructed of images and voice specified time length by using the function of voice detection unit 49 installed in camera device 21 where camera device 21 can be controlled by operating a control device that is installed in communication means 20 but that is not shown in the figure. This message can be stored on data base server 12 by the same method as in the “security on mode” described above. The presence of a new message is informed to the user by a system such as electronic mail to the user terminal or by a cell phone in the same way as in the method described above. The user can confirm the content of the message visually or by ear by accessing the web site. The images are not limited to dynamic images and may also be moving images during short periods.
[0047]In the foregoing, we have presented a detailed description of a security system which is a desirable mode of execution of this invention. However, this is strictly an illustration and does not limit this invention. Various modifications can be made by those skilled in the art.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Monument fitting assembly

Owner:THE BOEING CO

Classification and recommendation of technical efficacy words

  • Decrease in number
  • Inexpensive to construct

Multipoint conferencing system employing IP network and its configuration method

InactiveUS20050207357A1Inexpensive to constructSuppress processing loadMultiplex system selection arrangementsSpecial service provision for substationLoudspeakerTeleconference
Owner:NEC PERSONAL PRODUCTS LTD

Fastener mechanism for uniting articles of clothing

InactiveUS20050273909A1Inexpensive to constructSafe to useInsolesGarmentsFastener
Owner:ABRUSIA STEPHANIE +1

Card brace forming apparatus

InactiveUS20070209212A1Simple designInexpensive to constructMetal working apparatusEngineeringKnife blades
Owner:HILLTOP INVESTMENTS

Apparatus for measuring the inner surface of a culver or other tunnel defining structure imbedded in the ground

InactiveUS20110141464A1Inexpensive to constructQuickly efficiently measuring determiningActive open surveying meansOptically investigating flaws/contaminationEngineeringUnderground tunnel
Owner:CBC ENGINEERS & ASSOCS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products